Baltimore has been struggling with an aggressive cyber-attack over the last five weeks, previously profiled here, it has now been revealed the attack will cost the city $18.2 million, reported WBAL-TV 11.
The cost estimates were disclosed at a recent City Council budget hearing: city officials have already paid $4.6 million for recovery efforts since the ransomware was discovered May 7 and could spend an additional $5.4 million in 2H19. The remaining $8.2 million is from the loss or delayed revenue and loss of interest and penalty income.
Henry Raymond, #Baltimore Financial Dir., says the #ransomware attack will not affect the city’s tax bills, which will will go out on time in July - says it’s costing $18 million @wbalradio pic.twitter.com/NYlYBHTkCg— Phil Yacuboski (@WBALPhil) June 4, 2019
As of Tuesday, 35% of city employees had their email accounts restored, with the possibility of a full system restore by the end of the week.
Baltimore City Ransomware update:— Jayne Miller (@jemillerwbal) June 4, 2019
35% of city employees back on line with new passwords..should be 90% by end of week
Prop tax bills going out as usual July 1
Still no water billing
Est cost of attack: $18 mi
Ransom demand: $80k
US Conf of Mayors passing resolution to never pay pic.twitter.com/4E4zORnUDC
Some city operations have been shut down for the last month. Public works officials said no residents have received water bills because of the cyber attack.
Three weeks ago, we reported all essential systems required for transacting real estate deals in the city went offline becuase of the hack.
Realtor R.J.Breeden, the owner of The Breeden Group, who has dozens of homes listed throughout the city, said the hack is a loss of confidence in city officials. Breeden said several of his deals last month didn't close because the title company he uses couldn't write a deed without accessing lien certifications on city severs.
Hackers demanded the city pay an $80,000 ransom in Bitcoin on May 7, but Mayor Bernard C. "Jack" Young refused to pay. To be fair, the cost of a full system restore of the city's servers would have been in the millions of dollars if the ransomware was paid.
"Even if you pay, you still have to go into your system and make sure they're out of it. You can't just bring it back up and believe they are gone. We would bear much of these costs regardless," Deputy Chief of Staff, Sheryl Goldstein, said.
Rep. Dutch Ruppersberger was briefed last week by the National Security Agency that the Baltimore ransomware attack had nothing to do with a stolen NSA tool, contrary to our earlier reporting.
Members of Maryland's congressional delegation, including Sens. Ben Cardin and Chris Van Hollen and Reps. Ruppersberger, Elijah Cummings, John Sarbanes and David Trone, received a classified government briefing on Monday about the incident.
"Yesterday, we heard that current evidence suggests the city's network was infected via a phishing effort by malware known as RobbinHood," the members said in a statement. "We urge against further speculation until the investigation is complete and look forward to sharing more as we learn more. We are grateful for the FBI's ongoing efforts and plan to fully engage with DHS to strengthen systems in Baltimore and across the country to keep this from happening in the future."
The Baltimore ransomware incident serves as an important reminder that cybersecurity on the municipality level is greatly needed - shows how one cyber attack can paralyze an entire city.
It’s your fault, a National Security Agency official says to the city of Baltimore about the ransomware attack that has disrupted city services. The unknown hackers, who have demanded $100,000 in bitcoin, are using software stolen from NSA. The agency’s response: we warned Baltimore two years ago and they didn’t patch their network.
THE PROBLEM HAD been brewing for nearly a decade, intelligence sources had warned, as the National Security Agency vacuumed up more and more surveillance information into computer systems at its Ford Meade, Maryland, headquarters: There just wasn’t enough power coming through the local electric grid to support the rate at which the agency was hoarding other people’s communications.
The United States is no longer supplying its enemies only with conventional weapons – that list now also includes cyberweapons. While Baltimore has been struggling with an aggressive cyber-attack over the last three weeks, previously profiled here , it has now been revealed that a key component of the malware used by cyber-criminals was actually developed just a short drive from Baltimore - at the NSA, according to the New York Times.
It's been nearly two weeks since the City of Baltimore's networks were shut down in response to a ransomware attack, and there's still no end in sight to the attack's impact. It may be weeks more before the city's services return to something resembling normal—manual workarounds are being put in place to handle some services now, but the city's water billing and other payment systems remain offline, as well as most of the city's email and much of the government's phone systems.
Our IP Address: